9.2 Combat Malware.pptx - 9.2 MALWARE Combat Malware...

  • No School
  • AA 1
  • 15

This preview shows page 1 - 15 out of 15 pages.

Combat Malware 9.2 MALWARE TESTOUT ETHICAL HACKER PRO
Image of page 1
Detect open ports with nmap View open ports with netstat Counter malware with Windows Defender TESTOUT ETHICAL HACKER PRO Section Skill Overview
Image of page 2
Heuristicalgorithm TESTOUT ETHICAL HACKER PRO Key Terms
Image of page 3
Heuristicalgorithm: Heuristic algorithms generate fairly accurate results in a short amount of time by focusing on speed instead of accuracy and completeness. TESTOUT ETHICAL HACKER PRO Key Definitions
Image of page 4
Anti-Malware Software TESTOUT ETHICAL HACKER PRO
Image of page 5
Scanning Integrity checking Interception Code emulation Heuristic analysis TESTOUT ETHICAL HACKER PRO Malware Detection Methods
Image of page 6
Identifies unique characteristics Writes scanning process Updates antivirus program Finds threats TESTOUT ETHICAL HACKER PRO Scanning Steps
Image of page 7
Anti-Malware Software TESTOUT ETHICAL HACKER PRO
Image of page 8
Anti-Malware Software TESTOUT ETHICAL HACKER PRO
Image of page 9
Anti-Malware Software TESTOUT ETHICAL HACKER PRO
Image of page 10
Scan for open ports Scan for running processes Check registry entries Verify running Windows services
Image of page 11
Image of page 12
Image of page 13
Image of page 14
Image of page 15

You've reached the end of your free preview.

Want to read all 15 pages?

Unformatted text preview: Check startup programs Check the Event Log TESTOUT ETHICAL HACKER PRO Malware Penetration Test Steps Verify installed programs Scan files and folders Verify device drivers Check network and DNS settings and activity Scan for suspicious API calls Run anti-malware scans TESTOUT ETHICAL HACKER PRO Malware Penetration Test Steps Isolate the system Update software and scan Sanitize the system completely TESTOUT ETHICAL HACKER PRO Malware Removal Do the following labs: 9.2.5 Detect Open Ports with Nmap 9.2.6 View Open Ports with netstat 9.2.7 Scan for Open Ports from a Remote Computer 9.2.8 Counter Malware with Windows Defender TESTOUT ETHICAL HACKER PRO In-Class Practice What are the best methods for detecting malware? What steps should you take when penetration testing for malware? What actions should be taken when malware is discovered? TESTOUT ETHICAL HACKER PRO Class Discussion...
View Full Document

  • Fall '19

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors